Resource Exhaustion Affecting synapse package, versions <1.68.0-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.11% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Resource Exhaustion vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALPINE320-SYNAPSE-7014639
  • published23 May 2024
  • disclosed26 May 2023

Introduced: 26 May 2023

CVE-2022-39374  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade Alpine:3.20 synapse to version 1.68.0-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream synapse package and not the synapse package as distributed by Alpine. See How to fix? for Alpine:3.20 relevant fixed versions and status.

Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. If Synapse and a malicious homeserver are both joined to the same room, the malicious homeserver can trick Synapse into accepting previously rejected events into its view of the current state of that room. This can be exploited in a way that causes all further messages and state changes sent in that room from the vulnerable homeserver to be rejected. This issue has been patched in version 1.68.0

CVSS Scores

version 3.1